Vania Nuraini - Academia.edu (original) (raw)

Related Authors

Abdullah  Abuhussein

Sergey  Gordeychik

Sen Li

Ang Cui

Paul Smith

Paul Smith

AIT Austrian Institute of Technology GmbH

Irfan Bhatti

Mohammed Olama

Emir Suryo Guritno

Uploads

Papers by Vania Nuraini

Research paper thumbnail of Embedded Systems Security: Threats, Vulnerabilities, and Attack Taxonomy

—Embedded systems are the driving force for technological development in many domains such as aut... more —Embedded systems are the driving force for technological development in many domains such as automotive, healthcare, and industrial control in the emerging post-PC era. As more and more computational and networked devices are integrated into all aspects of our lives in a pervasive and " invisible " way, security becomes critical for the dependability of all smart or intelligent systems built upon these embedded systems. In this paper, we conduct a systematic review of the existing threats and vulnerabilities in embedded systems based on public available data. Moreover, based on the information, we derive an attack taxonomy for embedded systems. We envision that the findings in this paper provide a valuable insight of the threat landscape facing embedded systems. The knowledge can be used for a better understanding and the identification of security risks in system analysis and design.

Research paper thumbnail of Embedded Systems Security: Threats, Vulnerabilities, and Attack Taxonomy

—Embedded systems are the driving force for technological development in many domains such as aut... more —Embedded systems are the driving force for technological development in many domains such as automotive, healthcare, and industrial control in the emerging post-PC era. As more and more computational and networked devices are integrated into all aspects of our lives in a pervasive and " invisible " way, security becomes critical for the dependability of all smart or intelligent systems built upon these embedded systems. In this paper, we conduct a systematic review of the existing threats and vulnerabilities in embedded systems based on public available data. Moreover, based on the information, we derive an attack taxonomy for embedded systems. We envision that the findings in this paper provide a valuable insight of the threat landscape facing embedded systems. The knowledge can be used for a better understanding and the identification of security risks in system analysis and design.

Log In